Blog
Aug 13, 2019
BlackHat 2019 Recap
BlackHat has always been one of our favorite industry conferences. Although OffSec has been providing educational workshops for years at BlackHat, this was our first year holding an official booth. The booth was a major hit, as we had the opportunity to chat with long-time Offensive Security alumni and also meet some new faces…Did you attend one our BlackHat workshops or stop by the OffSec booth? If so, we’d love to hear about your experience and any feedback you might have — tag us on Twitter @OffSecTraining!
1 min read

Making connections
BlackHat has always been one of our favorite industry conferences. Although OffSec has been providing educational training for years at BlackHat, this was our first year holding an official booth. The booth was a major hit, as we had the opportunity to chat with long-time Offensive Security alumni and also meet some new faces.
Ning Wang, the CEO of Offensive Security, was also interviewed by Security Guy TV onsite at BlackHat. She spoke on OffSec’s unique training methodology, the mindset of a hacker, and the future of cyber threats. It’s full of interesting nuggets. You can watch it here:
Training
As we’ve done every year at BlackHat, we held several completely sold out, live training classes for several of our courses:
- Advanced Web Attacks and Exploitation (AWAE)
- Penetration Testing with Kali Linux (PWK — which offers the infamous OSCP certification)
- Advanced Windows Exploitation
If you missed out on any of the live training classes, don’t fret — you can still learn more and sign up for our online trainings here. Pursue an Offensive Security certification at your own pace, on your own time.
Did you attend BlackHat 2019?
Did you attend one our BlackHat trainings or stop by the OffSec booth? If so, we’d love to hear about your experience and any feedback you might have — tag us on Twitter @OffSecTraining!
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
CVE-2024-13059: Exploiting Path Traversal in AnythingLLM for Remote Code Execution
Discover CVE-2024-13059, a critical vulnerability flat that affects AnythingLLM’s handling of ASCII filenames in the multer library.
Apr 17, 2025
2 min read

Enterprise Security
How OSCP Holders Can Lead Their Teams to Greater Cybersecurity Resilience
Champion OSCP training in your organization to build a unified, resilient security team.
Apr 11, 2025
6 min read

Research & Tutorials
CVE-2024-57727: Path Traversal Vulnerability in SimpleHelp Web Application
CVE-2024-57727 lets attackers read sensitive files via path traversal in SimpleHelp. Learn more about how attackers exploit this flaw.
Apr 10, 2025
3 min read